General

  • Target

    1696-62-0x0000000000400000-0x0000000000412000-memory.dmp

  • Size

    72KB

  • MD5

    117bd3d02f18bb770986306d4ecc307e

  • SHA1

    c0962274301d48ad04bca2116fdcca92d33459df

  • SHA256

    81de0012350069f2536b98ce47aa06f098fdcee81f12e1dd2358bcd42cdbfe48

  • SHA512

    5393cb2ef405806ff679707c4f52dd77bfbe38e2de68ab78de8b763c906d4741305fe6c81cba463a7d6ab94416ca30935f669bae604f4944d3e5147b527df103

  • SSDEEP

    768:8qOKi+7erib7i6DcJKUU1HTbqHymKYGkHrYb1sIz1Mi0MTGVq123VEcBehZVDBl1:jky1EMd1KEWexDDRcpdUooIdYfN8

Malware Config

Extracted

Family

raccoon

Botnet

fadf0d3d79031d7b05aa7beed22b898d

C2

http://94.131.100.147/

rc4.plain

Signatures

Files

  • 1696-62-0x0000000000400000-0x0000000000412000-memory.dmp
    .exe windows x86


    Headers

    Sections